Search results for: internet data center
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27035

Search results for: internet data center

25565 Assessment of Base Station Radiation Pollution in Areas of Sheep and Goat Farms in Konya-Turkey

Authors: Selda Uzal Seyfi, Levent Seyfi

Abstract:

The technological devices are more often being used days by day. Thus, electro magnetic pollution is being more important now than last decades. Especially mobile phones and their base stations are subject to assessment in respect of all living beings health as well as of human beings. In this context, it is worth to evaluate the situation of electromagnetic radiation exposing living beings such as animals. In this study, electromagnetic radiation levels to which sheep are exposed in Konya/Turkey are presented. The electromagnetic radiation is measured at 1800 MHz for GSM base stations. 1085 sheep farms are determined in areas of Konya center region (Selçuklu, Meram, and Karatay) in which sheep and goat breeding is widely carried out. In this study, 790 sheep and goat farms, 10.8 % for total farms in Konya region (7276), having more than 100 animals are assessed. Then, the data obtained are depicted. As a conclusion, the results should be evaluated together with the future measurements to determine the exact effect on health of sheep and their productivity.

Keywords: electromagnetic pollution, sheep housing, sheep and goat farm, environmental pollution

Procedia PDF Downloads 485
25564 The Impact of System and Data Quality on Organizational Success in the Kingdom of Bahrain

Authors: Amal M. Alrayes

Abstract:

Data and system quality play a central role in organizational success, and the quality of any existing information system has a major influence on the effectiveness of overall system performance.Given the importance of system and data quality to an organization, it is relevant to highlight their importance on organizational performance in the Kingdom of Bahrain. This research aims to discover whether system quality and data quality are related, and to study the impact of system and data quality on organizational success. A theoretical model based on previous research is used to show the relationship between data and system quality, and organizational impact. We hypothesize, first, that system quality is positively associated with organizational impact, secondly that system quality is positively associated with data quality, and finally that data quality is positively associated with organizational impact. A questionnaire was conducted among public and private organizations in the Kingdom of Bahrain. The results show that there is a strong association between data and system quality, that affects organizational success.

Keywords: data quality, performance, system quality, Kingdom of Bahrain

Procedia PDF Downloads 489
25563 Implementing the Quality of Care Partnership to Reduce the Cost of Screenings for Sexually Transmitted Infections on a Southeastern College Campus

Authors: Amy Guidera, Steven Busby, Christian Williams, David Phillippi

Abstract:

College students are a priority preventative healthcare population that can engage in high-risk behaviors which may concurrently increase the potential for unsafe sexual practices, including contracting sexually transmitted infections (STIs). Early education, screening, treatment, and partner notification are important interventions for breaking the chain of transmission and recurrence in relation to preventing poor health outcomes and mitigating college dropout rates. The aim of this quality improvement project was to determine if the reduction in STI screening costs for college students (aged 18-30 years old) would increase the amount of STI screenings conducted at a university health center over the course of an academic semester while evaluating our ability to achieve an improved quality of care at a reduced cost, along with improved STI reporting and documentation. This study was conducted through retrospective chart reviews of STI-related visits and utilized the RADAR matrix to provide a guiding, iterative mechanism to continuously reassess goals and outcomes defined in a memorandum of agreement (MOA) between a university health center and the state department of health (DOH) laboratory. The project failed to increase the amount of STI screenings, most likely due to the emergence of COVID-19, but resulted in improved quality of care for students, improved STI-related visit documentation and reporting, and significantly reduced costs for STI screening for collegiate students at a southeastern private university campus.

Keywords: college health, college students, preventive health, reproductive health, sexually transmitted infections, young adults

Procedia PDF Downloads 133
25562 Recurrent Patterns of Netspeak among Selected Nigerians on WhatsApp Platform: A Quest for Standardisation

Authors: Lily Chimuanya, Esther Ajiboye, Emmanuel Uba

Abstract:

One of the consequences of online communication is the birth of new orthography genres characterised by novel conventions of abbreviation and acronyms usually referred to as Netspeak. Netspeak, also known as internet slang, is a style of writing mainly used in online communication to limit the length of text characters and to save time. The aim of this study is to evaluate how second language users of the English language have internalised this new convention of writing; identify the recurrent patterns of Netspeak; and assess the consistency of the use of the identified patterns in relation to their meanings. The study is corpus-based, and data drawn from WhatsApp chart pages of selected groups of Nigerian English speakers show a large occurrence of inconsistencies in the patterns of Netspeak and their meanings. The study argues that rather than emphasise the negative impact of Netspeak on the communicative competence of second language users, studies should focus on suggesting models as yardsticks for standardising the usage of Netspeak and indeed all other emerging language conventions resulting from online communication. This stance stems from the inevitable global language transformation that is eminent with the coming of age of information technology.

Keywords: abbreviation, acronyms, Netspeak, online communication, standardisation

Procedia PDF Downloads 386
25561 Cloud Computing in Data Mining: A Technical Survey

Authors: Ghaemi Reza, Abdollahi Hamid, Dashti Elham

Abstract:

Cloud computing poses a diversity of challenges in data mining operation arising out of the dynamic structure of data distribution as against the use of typical database scenarios in conventional architecture. Due to immense number of users seeking data on daily basis, there is a serious security concerns to cloud providers as well as data providers who put their data on the cloud computing environment. Big data analytics use compute intensive data mining algorithms (Hidden markov, MapReduce parallel programming, Mahot Project, Hadoop distributed file system, K-Means and KMediod, Apriori) that require efficient high performance processors to produce timely results. Data mining algorithms to solve or optimize the model parameters. The challenges that operation has to encounter is the successful transactions to be established with the existing virtual machine environment and the databases to be kept under the control. Several factors have led to the distributed data mining from normal or centralized mining. The approach is as a SaaS which uses multi-agent systems for implementing the different tasks of system. There are still some problems of data mining based on cloud computing, including design and selection of data mining algorithms.

Keywords: cloud computing, data mining, computing models, cloud services

Procedia PDF Downloads 476
25560 Cross-border Data Transfers to and from South Africa

Authors: Amy Gooden, Meshandren Naidoo

Abstract:

Genetic research and transfers of big data are not confined to a particular jurisdiction, but there is a lack of clarity regarding the legal requirements for importing and exporting such data. Using direct-to-consumer genetic testing (DTC-GT) as an example, this research assesses the status of data sharing into and out of South Africa (SA). While SA laws cover the sending of genetic data out of SA, prohibiting such transfer unless a legal ground exists, the position where genetic data comes into the country depends on the laws of the country from where it is sent – making the legal position less clear.

Keywords: cross-border, data, genetic testing, law, regulation, research, sharing, South Africa

Procedia PDF Downloads 122
25559 Trajectories of PTSD from 2-3 Years to 5-6 Years among Asian Americans after the World Trade Center Attack

Authors: Winnie Kung, Xinhua Liu, Debbie Huang, Patricia Kim, Keon Kim, Xiaoran Wang, Lawrence Yang

Abstract:

Considerable Asian Americans were exposed to the World Trade Center attack due to the proximity of the site to Chinatown and a sizeable number of South Asians working in the collapsed and damaged buildings nearby. Few studies focused on Asians in examining the disaster’s mental health impact, and even less longitudinal studies were reported beyond the first couple of years after the event. Based on the World Trade Center Health Registry, this study examined the trajectory of PTSD of individuals directly exposed to the attack from 2-3 to 5-6 years after the attack, comparing Asians against the non-Hispanic White group. Participants included 2,431 Asians and 31,455 Whites. Trajectories were delineated into the resilient, chronic, delayed-onset and remitted groups using PTSD checklist cut-off score at 44 at the 2 waves. Logistic regression analyses were conducted to compare the poorer trajectories against the resilient as a reference group, using predictors of baseline sociodemographic, exposure to the disaster, lower respiratory symptoms and previous depression/anxiety disorder diagnosis, and recruitment source as the control variable. Asians had significant lower socioeconomic status in terms of income, education and employment status compared to Whites. Over 3/4 of participants from both races were resilient, though slightly less for Asians than Whites (76.5% vs 79.8%). Asians had a higher proportion with chronic PTSD (8.6% vs 7.4%) and remission (5.9% vs 3.4%) than Whites. A considerable proportion of participants had delayed-onset in both races (9.1% Asians vs 9.4% Whites). The distribution of trajectories differed significantly by race (p<0.0001) with Asians faring poorer. For Asians, in the chronic vs resilient group, significant protective factors included age >65, annual household income >$50,000, and never married vs married/cohabiting; risk factors were direct disaster exposure, job loss due to 9/11, lost someone, and tangible loss; lower respiratory symptoms and previous mental disorder diagnoses. Similar protective and risk factors were noted for the delayed-onset group, except education being protective; and being an immigrant a risk. Between the 2 comparisons, the chronic group was more vulnerable than the delayed-onset as expected. It should also be noted that in both comparisons, Asians’ current employment status had no significant impact on their PTSD trajectory. Comparing between Asians against Whites, the direction of the relationships between the predictors and the PTSD trajectories were mostly the same, although more factors were significant for Whites than for Asians. A few factors showed significant racial difference: Higher risk for lower respiratory symptoms for Whites than Asians, higher risk for pre-9/11 mental disorder diagnosis for Asians than Whites, and immigrant a risk factor for the remitted vs resilient groups for Whites but not for Asians. Over 17% Asians still suffered from PTSD 5-6 years after the WTC attack signified its persistent impact which incurred substantial human, social and economic costs. The more disadvantaged socioeconomic status of Asians rendered them more vulnerable in their mental health trajectories relative to Whites. Together with their well-documented low tendency to seek mental health help, outreach effort to this population is needed to ensure follow-up treatment and prevention.

Keywords: PTSD, Asian Americans, World Trade Center Attack, racial differences

Procedia PDF Downloads 261
25558 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 137
25557 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 304
25556 Estimating Annual Average Daily Traffic Using Statewide Traffic Data Programs: Missing Data Analysis

Authors: Muhammad Faizan Rehman Qureshi, Ahmed Al-Kaisy

Abstract:

State highway agencies usually operate system-wide traffic monitoring programs for collecting traffic data. Of particular importance is the traffic volume data that is used in the estimation of the Annual Average Daily Traffic (AADT). State Departments of Transportation (DOTs) measure the AADT at locations of permanent ATR and WIM stations and estimate the parameter at all other locations using short-term counts. Traffic counters at the permanent ATR and WIM stations frequently malfunction and result in a specific period(s) of inaccurate or missing data. The study used ATR and WIM data from the state of Montana to examine the effect of missing data on the accuracy of AADT estimation. Two random sampling techniques were used, and three scenarios of data availability were considered in the investigation: one, two and three weeks of data within each month. The study results showed that the increase in AADT approximation was not proportional to the increase in the amount of missing data. Given the extreme scenario of missing data (all permanent stations missing data simultaneously) and the relatively lower effect on AADT approximation, it can be concluded that the current practice in treating missing data does not involve a considerable compromise in the accuracy of AADT estimation.

Keywords: traffic monitoring program, AADT, missing data, adjustment factors, traffic data collection, permanent stations

Procedia PDF Downloads 5
25555 Data Integration with Geographic Information System Tools for Rural Environmental Monitoring

Authors: Tamas Jancso, Andrea Podor, Eva Nagyne Hajnal, Peter Udvardy, Gabor Nagy, Attila Varga, Meng Qingyan

Abstract:

The paper deals with the conditions and circumstances of integration of remotely sensed data for rural environmental monitoring purposes. The main task is to make decisions during the integration process when we have data sources with different resolution, location, spectral channels, and dimension. In order to have exact knowledge about the integration and data fusion possibilities, it is necessary to know the properties (metadata) that characterize the data. The paper explains the joining of these data sources using their attribute data through a sample project. The resulted product will be used for rural environmental analysis.

Keywords: remote sensing, GIS, metadata, integration, environmental analysis

Procedia PDF Downloads 113
25554 Socio-Economic Problems in Treatment of Non-Union Both Bones Fracture of the Leg: A Retrospective Study

Authors: Rajendra Kumar Kanojia

Abstract:

Treatment of fracture both bones of leg following trauma is done intially at nearby primary health care center.primary management for shock,pain,control of bleeding,plaster application. These are treated for primay fixation of fracture, debridment of wound. Then, they were refered to tertiary care where they were again and planned for further treatment. This leads to loss of lot of time, money, job, etc.

Keywords: fracture both bones leg, non-union, ilizarov, cost

Procedia PDF Downloads 565
25553 Digital Nomads: Current Context, Difficulties, and Opportunities for Costa Rica

Authors: Cristina Gutiérrez Carranza

Abstract:

Digital nomadism is a trend and lifestyle which combines work and traveling. This tourism tendency is motivated by the desire to have a fixed source of financial income while becoming independent from a specific work location. This study contextualizes Costa Rica and its potential prospects to take advantage of this tourism market niche. It explores the dynamics of digital nomadism in the context of Costa Rica, analyzing the current scenario, challenges, and opportunities related to this global phenomenon. The research covers several areas, including the conceptualization of digital nomadism, its historical background, and contemporary manifestations. The investigation delves into the present state of digital nomadism, evaluating the extent of digitalization in Costa Rica, mobile phone coverage, and fixed internet access. As part of the strategies implemented, as the study develops, mapping the most common destinations of digital nomads is a key factor, bringing a sight on the aspects that make Costa Rica an attractive location for this emerging tourist group. Additionally, the paper draws insights from hosting entrepreneurs and digital nomads with work visas in Costa Rica, offering a comprehensive understanding of the experiences and perspectives from both sides. Hence, the study includes data from a sample of 20 digital nomads holding visas for Costa Rica, offering a detailed analysis of their professional activities, experiences and needs as remote workers in the country. As well it adds in perceptions from 10 entrepreneurs engaged in providing accommodation services to digital nomads contribute to a degree of understanding of the way they have faced this growing movement. This research provides significant insights on the dynamics of digital nomadism in Costa Rica by integrating data from specific sources. Policymakers, entrepreneurs, and other stakeholders are anticipated to gain valuable data from the findings regarding the opportunities and challenges of hosting and accommodating digital nomads, which will ultimately aid in the creation of plans to capitalize on this worldwide trend for the nation's socioeconomic development.

Keywords: digital nomads, tourism, sustainability, digital nomads visa, remote jobs

Procedia PDF Downloads 64
25552 Analysis of Genomics Big Data in Cloud Computing Using Fuzzy Logic

Authors: Mohammad Vahed, Ana Sadeghitohidi, Majid Vahed, Hiroki Takahashi

Abstract:

In the genomics field, the huge amounts of data have produced by the next-generation sequencers (NGS). Data volumes are very rapidly growing, as it is postulated that more than one billion bases will be produced per year in 2020. The growth rate of produced data is much faster than Moore's law in computer technology. This makes it more difficult to deal with genomics data, such as storing data, searching information, and finding the hidden information. It is required to develop the analysis platform for genomics big data. Cloud computing newly developed enables us to deal with big data more efficiently. Hadoop is one of the frameworks distributed computing and relies upon the core of a Big Data as a Service (BDaaS). Although many services have adopted this technology, e.g. amazon, there are a few applications in the biology field. Here, we propose a new algorithm to more efficiently deal with the genomics big data, e.g. sequencing data. Our algorithm consists of two parts: First is that BDaaS is applied for handling the data more efficiently. Second is that the hybrid method of MapReduce and Fuzzy logic is applied for data processing. This step can be parallelized in implementation. Our algorithm has great potential in computational analysis of genomics big data, e.g. de novo genome assembly and sequence similarity search. We will discuss our algorithm and its feasibility.

Keywords: big data, fuzzy logic, MapReduce, Hadoop, cloud computing

Procedia PDF Downloads 297
25551 Forthcoming Big Data on Smart Buildings and Cities: An Experimental Study on Correlations among Urban Data

Authors: Yu-Mi Song, Sung-Ah Kim, Dongyoun Shin

Abstract:

Cities are complex systems of diverse and inter-tangled activities. These activities and their complex interrelationships create diverse urban phenomena. And such urban phenomena have considerable influences on the lives of citizens. This research aimed to develop a method to reveal the causes and effects among diverse urban elements in order to enable better understanding of urban activities and, therefrom, to make better urban planning strategies. Specifically, this study was conducted to solve a data-recommendation problem found on a Korean public data homepage. First, a correlation analysis was conducted to find the correlations among random urban data. Then, based on the results of that correlation analysis, the weighted data network of each urban data was provided to people. It is expected that the weights of urban data thereby obtained will provide us with insights into cities and show us how diverse urban activities influence each other and induce feedback.

Keywords: big data, machine learning, ontology model, urban data model

Procedia PDF Downloads 412
25550 Impacts of Filmmaking on Destinations: Perceptions of the Residents of Arcos de Valdevez

Authors: André Rafael Ferreira, Laurentina Vareiro, Raquel Mendes

Abstract:

This study’s main objective is to explore residents’ perceptions of film-induced tourism and the impacts of filmmaking on the development of a destination. Specifically, the research examines resident´s perceptions of the social, economic, and environmental impacts on a Portuguese municipality (Arcos de Valdevez) given its feature in a popular Portuguese television series. Data is collected by means of an Internet survey, in which resident´s perceptions of the impacts of filmmaking are solicited. Residents generally agree that the recording and exhibition of the television series is important to the municipality, and contributes to the increased number of tourists. Given that residents consider that the positive impacts are more significant than the negative impacts, they supported the recording of another television series in the same municipality. Considering that destination managers and tourism development authorities aim to plan for optimal tourism development, and at the same time wish to minimize the negative impacts of this development on the local communities, monitoring residents’ opinions of perceived impacts is a good way of incorporating their reaction into tourism planning and development. The results of this research may provide useful information in this sense.

Keywords: film-induced tourism, residents’ perceptions, tourism development, tourism impacts

Procedia PDF Downloads 450
25549 Commentary on Successful and Emerging Bullying Control Programs: A Comparison between Eighteen Bullying Interventions Applied Worldwide

Authors: Sohni Siddiqui, Anja Schultze-Krumbholz

Abstract:

Our lives now revolve more around online-related tasks, as the internet has become a necessity. One of the disturbance concerns with high internet usage is the multiplication of cyber-associated risky behaviors such as cyber aggression and/or cyberbullying. Cyber Bullying is an emerging issue that needs immediate attention from many stakeholders such as parents, doctors, school administrators, policymakers, researchers, and others, especially in the COVID-19 pandemic when online learning has been adopted as an instructional strategy, and there is a continuous rise in cyberbullying cases. The aim of the article is to review existing successful and emerging interventions designed to control bullying and cyberbullying by engaging individuals through teachers’ professional development and adopting a whole-school approach. The study identified the strengths and limitations of the programs and suggested improvements to existing interventions. Preparing interventions with a strong theoretical framework, integrating applications of emerging theories in interventions, promoting proactive and reactive strategies in combination, beginning with the baseline needs assessment surveys, reducing digital time and digital divide among parents and children, promoting the concept of lead trainer, peer trainer, and hot spots, focusing on physical activities, use of landmarks are some of the recommendations proposed by authors. In addition to face-to-face intervention, the researchers recommend updating and improving previous intervention programs with games and apps. Especially in the time of pandemic crises, when face-to-face interactions are limited and cyberbullying is triggered, the use of apps, web-based interventions, and games can be an effective way to control electronic perpetration and victimization.

Keywords: anti bullying programs, cyber bullying, individualized trainings, teachers’ professional development, whole school interventions

Procedia PDF Downloads 145
25548 Family Relationships among Users and Non Users of Social Media

Authors: Sawsan Kamal Kalil El Galad, Heba Shafik Ibrahim Mohamed, Rania Ismail Moussa

Abstract:

New developments in the technological world have made the internet an innovative way for individuals and families to communicate. Social media sites help in fulfilling communication needs and wants of their users. The use of social media may have an effect on the family relation either in a positive or negative manner. This study aimed to investigate the family relationships among users and non users of social media. The study followed a cross- sectional descriptive comparative research design. It was conducted on 360 employees, at Damanhour University in Elbeheira, Egypt. Brief Family Relationship Scale (BFRS) was used to collect the data of this study. The results revealed that the mean score of the social media users is slightly increased in relation to the non users of social media mean score with no significant difference between both groups. It was concluded that using social media for short time has no effect on the family relationship, sitting with family in daily base satisfy the social and emotional needs of its member and enhance family relations. Recommendations encompassed that the time spent on social media should be assessed regularly to prevent being isolated from the family members. Educational programs to increase the parent’s awareness how to deal with their children regarding social media and its risks.

Keywords: social media, family relationships, communication needs, culture

Procedia PDF Downloads 107
25547 Data-driven Decision-Making in Digital Entrepreneurship

Authors: Abeba Nigussie Turi, Xiangming Samuel Li

Abstract:

Data-driven business models are more typical for established businesses than early-stage startups that strive to penetrate a market. This paper provided an extensive discussion on the principles of data analytics for early-stage digital entrepreneurial businesses. Here, we developed data-driven decision-making (DDDM) framework that applies to startups prone to multifaceted barriers in the form of poor data access, technical and financial constraints, to state some. The startup DDDM framework proposed in this paper is novel in its form encompassing startup data analytics enablers and metrics aligning with startups' business models ranging from customer-centric product development to servitization which is the future of modern digital entrepreneurship.

Keywords: startup data analytics, data-driven decision-making, data acquisition, data generation, digital entrepreneurship

Procedia PDF Downloads 321
25546 Subjective Well-Being through Coaching Process

Authors: Pendar Fazel

Abstract:

Well-being is a good or satisfactory condition of existence; a state characterized by health, happiness, and prosperity. Well-being of people is correlated with, the cognitive, social, emotional, and physical aspect of their personality. Subjective well-being, people’s emotional and cognitive evaluations of their lives, includes what lay people call happiness, peace, fulfillment, and life satisfaction. Unfortunately in this period of time people are under the pressure of financial, social problems, and other stress factors which made them vulnerable, and their well-being is threatened. Personal Coaching as a holistic orientation and novel approach is ideal for the present century which help people, to find balance, enjoyment and meaning in their lives as well as improving performance, skills and effectiveness. The aim of the present article besides introducing the personal coaching is determining how personal coaching can positively effects on subjective well-being, under this aim we tend to describe how coaching impact on the cognitive and emotional reconstruction. Present qualitative research is descriptive analytic study, which data gathered by manual library research and search within authentic article through internet; analyzed personal coaching which integrated different views into an operational one helps people promote self-awareness as well as evaluate, emotional and cognitive aspect of their personality and provide appropriate subjective well-being.

Keywords: subjective well-being, coaching, well-being, positive psychology, personal growth

Procedia PDF Downloads 523
25545 Implications of Learning Resource Centre in a Web Environment

Authors: Darshana Lal, Sonu Rana

Abstract:

Learning Resource Centers (LRC) are acquiring different kinds of documents like books, journals, thesis, dissertations, standard, databases etc. in print and e-form. This article deals with the different types of sources available in LRC. It also discusses the concept of the web, as a tool, as a multimedia system and the different interfaces available on the web. The reasons for establishing LRC are highlighted along with the assignments of LRC. Different features of LRC‘S like self-learning and group learning are described. It also implements a group of activities like reading, learning, educational etc. The use of LRC by students and faculties are given and concluded with the benefits.

Keywords: internet, search engine, resource centre, opac, self-learning, group learning

Procedia PDF Downloads 372
25544 Validity of Universe Structure Conception as Nested Vortexes

Authors: Khaled M. Nabil

Abstract:

This paper introduces the Nested Vortexes conception of the universe structure and interprets all the physical phenomena according this conception. The paper first reviews recent physics theories, either in microscopic scale or macroscopic scale, to collect evidence that the space is not empty. But, these theories describe the property of the space medium without determining its structure. Determining the structure of space medium is essential to understand the mechanism that leads to its properties. Without determining the space medium structure, many phenomena; such as electric and magnetic fields, gravity, or wave-particle duality remain uninterpreted. Thus, this paper introduces a conception about the structure of the universe. It assumes that the universe is a medium of ultra-tiny homogeneous particles which are still undiscovered. Like any medium with certain movements, possibly because of a great asymmetric explosion, vortexes have occurred. A vortex condenses the ultra-tiny particles in its center forming a bigger particle, the bigger particles, in turn, could be trapped in a bigger vortex and condense in its center forming a much bigger particle and so on. This conception describes galaxies, stars, protons as particles at different levels. Existing of the particle’s vortexes make the consistency of the speed of light postulate is not true. This conception shows that the vortex motion dynamic agrees with the motion of all the universe particles at any level. An experiment has been carried out to detect the orbiting effect of aggregated vortexes of aligned atoms of a permanent magnet. Based on the described particle’s structure, the gravity force of a particle and attraction between particles as well as charge, electric and magnetic fields and quantum mechanics characteristics are interpreted. All augmented physics phenomena are solved.

Keywords: astrophysics, cosmology, particles’ structure model, particles’ forces

Procedia PDF Downloads 117
25543 The Role of Social Networks in Promoting Ethics in Iranian Sports

Authors: Tayebeh Jameh-Bozorgi, M. Soleymani

Abstract:

In this research, the role of social networks in promoting ethics in Iranian sports was investigated. The research adopted a descriptive-analytic method, and the survey’s population consisted of all the athletes invited to the national football, volleyball, wrestling and taekwondo teams. Considering the limited population, the size of the society was considered as the sample size. After the distribution of the questionnaires, 167 respondents answered the questionnaires correctly. The data collection tool was chosen according to Hamid Ghasemi`s, standard questionnaire for social networking and mass media, which has 28 questions. Reliability of the questionnaire was calculated using Cronbach's alpha coefficient (94%). The content validity of the questionnaire was also approved by the professors. In this study, descriptive statistics and inferential statistical methods were used to analyze the data using statistical software. The benchmark tests used in this research included the following: Binomial test, Friedman test, Spearman correlation coefficient, Vermont Creamers, Good fit test and comparative prototypes. The results showed that athletes believed that social network has a significant role in promoting sport ethics in the community. Telegram has been known to play a big role than other social networks. Moreover, the respondents' view on the role of social networks in promoting sport ethics was significantly different in both men and women groups. In fact, women had a more positive attitude towards the role of social networks in promoting sport ethics than men. The respondents' view of the role of social networks in promoting the ethics of sports in the study groups also had a significant difference. Additionally, there was a significant and reverse relationship between the sports experience and the attitude of national athletes regarding the role of social networks in promoting ethics in sports.

Keywords: ethics, social networks, mass media, Iranian sports, internet

Procedia PDF Downloads 285
25542 The Role of Community Museum in Ethnic Identity: A Case of Tharu Cultural Museum and Research Center in Chitwan Nepal

Authors: Birendra Mahato, Shiva Narayan Chaudhary

Abstract:

Tharus are indigenous inhabitants of the Tarai, the narrow strip of flat and fertile land that lies at the foothills of the Himalayas. They have unique rituals, festivals, and music, while their clothes and ornaments are similar to some ethnic groups of India. After the control of malaria in the Terai between 1955 to 1965, (with the help of the U.S. Government, the WHO and the government of Nepal) the rate of in-migration skyrocketed, particularly of Nepal’s hill people, whose culture, along with the use of the Western education system, was gradually adopted by the Tharus. Among the many challenges, the Tharus face is their assimilation into the dominant Nepali culture. .The Tharus are thus under threat of slowly losing their ethnic identity and cultural values. In order to preserve the indigenous Tharu Culture, Tharu Cultural Museum, and Research Center. It is a community based non-governmental and non-profitable museum established in 2005 by Tharu intellectuals, traditional leaders and youths. The main goal of the museum is to preserve Tharu culture through different activities with direct and indirect involvement of community people. It aims to preserve arts, culture, handicrafts, and artifacts related to Indigenous Tharu People. Similarly, the museum displays an exhibition about the Tharu histories, lives, culture, and their indigenous knowledge and skills. The paper aims to demonstrate that community museums can be one of the key hubs for the preservation of culture with the collection and promotion of cultural objects, artifacts, and intangible cultural heritages. The preservation of culture not only has contributed to establishing their ethnic identity but also has contributed to establishing their recognition of their political space in the mainstream politics - the constitution of Nepal has recognized Tharus to provide reservation for the political space.

Keywords: community museum, tharu, , identity, culture

Procedia PDF Downloads 132
25541 Vibration Control of a Horizontally Supported Rotor System by Using a Radial Active Magnetic Bearing

Authors: Vishnu A., Ashesh Saha

Abstract:

The operation of high-speed rotating machinery in industries is accompanied by rotor vibrations due to many factors. One of the primary instability mechanisms in a rotor system is the centrifugal force induced due to the eccentricity of the center of mass away from the center of rotation. These unwanted vibrations may lead to catastrophic fatigue failure. So, there is a need to control these rotor vibrations. In this work, control of rotor vibrations by using a 4-pole Radial Active Magnetic Bearing (RAMB) as an actuator is analysed. A continuous rotor system model is considered for the analysis. Several important factors, like the gyroscopic effect and rotary inertia of the shaft and disc, are incorporated into this model. The large deflection of the shaft and the restriction to axial motion of the shaft at the bearings result in nonlinearities in the system governing equation. The rotor system is modeled in such a way that the system dynamics can be related to the geometric and material properties of the shaft and disc. The mathematical model of the rotor system is developed by incorporating the control forces generated by the RAMB. A simple PD controller is used for the attenuation of system vibrations. An analytical expression for the amplitude and phase equations is derived using the Method of Multiple Scales (MMS). Analytical results are verified with the numerical results obtained using an ‘ode’ solver in-built into MATLAB Software. The control force is found to be effective in attenuating the system vibrations. The multi-valued solutions leading to the jump phenomenon are also eliminated with a proper choice of control gains. Most interestingly, the shape of the backbone curves can also be altered for certain values of control parameters.

Keywords: rotor dynamics, continuous rotor system model, active magnetic bearing, PD controller, method of multiple scales, backbone curve

Procedia PDF Downloads 77
25540 A Study on the Magnetic and Submarine Geology Structure of TA22 Seamount in Lau Basin, Tonga

Authors: Soon Young Choi, Chan Hwan Kim, Chan Hong Park, Hyung Rae Kim, Myoung Hoon Lee, Hyeon-Yeong Park

Abstract:

We performed the marine magnetic, bathymetry and seismic survey at the TA22 seamount (in the Lau basin, SW Pacific) for finding the submarine hydrothermal deposits in October 2009. We acquired magnetic and bathymetry data sets by suing Overhouser Proton Magnetometer SeaSPY (Marine Magnetics Co.), Multi-beam Echo Sounder EM120 (Kongsberg Co.). We conducted the data processing to obtain detailed seabed topography, magnetic anomaly, reduction to the pole (RTP) and magnetization. Based on the magnetic properties result, we analyzed submarine geology structure of TA22 seamount with post-processed seismic profile. The detailed bathymetry of the TA22 seamount showed the left and right crest parts that have caldera features in each crest central part. The magnetic anomaly distribution of the TA22 seamount regionally displayed high magnetic anomalies in northern part and the low magnetic anomalies in southern part around the caldera features. The RTP magnetic anomaly distribution of the TA22 seamount presented commonly high magnetic anomalies in the each caldera central part. Also, it represented strong anomalies at the inside of caldera rather than outside flank of the caldera. The magnetization distribution of the TA22 seamount showed the low magnetization zone in the center of each caldera, high magnetization zone in the southern and northern east part. From analyzed the seismic profile map, The TA22 seamount area is showed for the inferred small mounds inside each caldera central part and it assumes to make possibility of sills by the magma in cases of the right caldera. Taking into account all results of this study (bathymetry, magnetic anomaly, RTP, magnetization, seismic profile) with rock samples at the left caldera area in 2009 survey, we suppose the possibility of hydrothermal deposits at mounds in each caldera central part and at outside flank of the caldera representing the low magnetization zone. We expect to have the better results by combined modeling from this study data with the other geological data (ex. detailed gravity, 3D seismic, petrologic study results and etc).

Keywords: detailed bathymetry, magnetic anomaly, seamounts, seismic profile, SW Pacific

Procedia PDF Downloads 394
25539 Place of Radiotherapy in the Treatment of Intracranial Meningiomas: Experience of the Cancer Center Emir Abdelkader of Oran Algeria

Authors: Taleb L., Benarbia M., Boutira F. M., Allam H., Boukerche A.

Abstract:

Introduction and purpose of the study: Meningiomas are the most common non-glial intracranial tumors in adults, accounting for approximately 30% of all central nervous system tumors. The aim of our study is to determine the epidemiological, clinical, therapeutic, and evolutionary characteristics of a cohort of patients with intracranial meningioma treated with radiotherapy at the Emir Abdelkader Cancer Center in Oran. Material and methods: This is a retrospective study of 44 patients during the period from 2014 to 2020. The overall survival and relapse-free survival curves were calculated using the Kaplan-Meier method. Results and statistical analysis: The median age of the patients was 49 years [21-76 years] with a clear female predominance (sex ratio=2.4). The average diagnostic delay was seven months [2 to 24 months], the circumstances of the discovery of which were dominated by headaches in 54.5% of cases (n=24), visual disturbances in 40.9% (n=18), and motor disorders in 15.9% (n=7). The seat of the tumor was essentially at the level of the base of the skull in 52.3% of patients (n=23), including 29.5% (n=13) at the level of the cavernous sinus, 27.3% (n=12) at the parasagittal level and 20.5% (n=9) at the convexity. The diagnosis was confirmed surgically in 36 patients (81.8%) whose anatomopathological study returned in favor of grades I, II, and III in respectively 40.9%, 29.5%, and 11.4% of the cases. Radiotherapy was indicated postoperatively in 45.5% of patients (n=20), exclusive in 27.3% (n=12) and after tumor recurrence in 27.3% of cases (n=18). The irradiation doses delivered were as follows: 50 Gy (20.5%), 54 Gy (65.9%), and 60 Gy (13.6%). With a median follow-up of 69 months, the probabilities of relapse-free survival and overall survival at three years are 93.2% and 95.4%, respectively, whereas they are 71.2% and 80.7% at five years. Conclusion: Meningiomas are common primary brain tumors. Most often benign but can also progress aggressively. Their treatment is essentially surgical, but radiotherapy retains its place in specific situations, allowing good tumor control and overall survival.

Keywords: diagnosis, meningioma, surgery, radiotherapy, survival

Procedia PDF Downloads 98
25538 Long Short-Term Memory Based Model for Modeling Nicotine Consumption Using an Electronic Cigarette and Internet of Things Devices

Authors: Hamdi Amroun, Yacine Benziani, Mehdi Ammi

Abstract:

In this paper, we want to determine whether the accurate prediction of nicotine concentration can be obtained by using a network of smart objects and an e-cigarette. The approach consists of, first, the recognition of factors influencing smoking cessation such as physical activity recognition and participant’s behaviors (using both smartphone and smartwatch), then the prediction of the configuration of the e-cigarette (in terms of nicotine concentration, power, and resistance of e-cigarette). The study uses a network of commonly connected objects; a smartwatch, a smartphone, and an e-cigarette transported by the participants during an uncontrolled experiment. The data obtained from sensors carried in the three devices were trained by a Long short-term memory algorithm (LSTM). Results show that our LSTM-based model allows predicting the configuration of the e-cigarette in terms of nicotine concentration, power, and resistance with a root mean square error percentage of 12.9%, 9.15%, and 11.84%, respectively. This study can help to better control consumption of nicotine and offer an intelligent configuration of the e-cigarette to users.

Keywords: Iot, activity recognition, automatic classification, unconstrained environment

Procedia PDF Downloads 219
25537 Cryptographic Protocol for Secure Cloud Storage

Authors: Luvisa Kusuma, Panji Yudha Prakasa

Abstract:

Cloud storage, as a subservice of infrastructure as a service (IaaS) in Cloud Computing, is the model of nerworked storage where data can be stored in server. In this paper, we propose a secure cloud storage system consisting of two main components; client as a user who uses the cloud storage service and server who provides the cloud storage service. In this system, we propose the protocol schemes to guarantee against security attacks in the data transmission. The protocols are login protocol, upload data protocol, download protocol, and push data protocol, which implement hybrid cryptographic mechanism based on data encryption before it is sent to the cloud, so cloud storage provider does not know the user's data and cannot analysis user’s data, because there is no correspondence between data and user.

Keywords: cloud storage, security, cryptographic protocol, artificial intelligence

Procedia PDF Downloads 351
25536 Decentralized Data Marketplace Framework Using Blockchain-Based Smart Contract

Authors: Meshari Aljohani, Stephan Olariu, Ravi Mukkamala

Abstract:

Data is essential for enhancing the quality of life. Its value creates chances for users to profit from data sales and purchases. Users in data marketplaces, however, must share and trade data in a secure and trusted environment while maintaining their privacy. The first main contribution of this paper is to identify enabling technologies and challenges facing the development of decentralized data marketplaces. The second main contribution is to propose a decentralized data marketplace framework based on blockchain technology. The proposed framework enables sellers and buyers to transact with more confidence. Using a security deposit, the system implements a unique approach for enforcing honesty in data exchange among anonymous individuals. Before the transaction is considered complete, the system has a time frame. As a result, users can submit disputes to the arbitrators which will review them and respond with their decision. Use cases are presented to demonstrate how these technologies help data marketplaces handle issues and challenges.

Keywords: blockchain, data, data marketplace, smart contract, reputation system

Procedia PDF Downloads 154